cvelist/2023/21xxx/CVE-2023-21179.json

62 lines
2.0 KiB
JSON
Raw Normal View History

2022-11-03 23:00:32 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-21179",
2023-06-28 18:00:43 +00:00
"ASSIGNER": "security@android.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_value": "Android-13"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://source.android.com/security/bulletin/pixel/2023-06-01",
"url": "https://source.android.com/security/bulletin/pixel/2023-06-01"
}
]
2022-11-03 23:00:32 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-06-28 18:00:43 +00:00
"value": "In parseSecurityParamsFromXml of XmlUtil.java, there is a possible bypass of user specified wifi encryption protocol due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-272755865"
2022-11-03 23:00:32 +00:00
}
]
}
}